aboutsummaryrefslogtreecommitdiffstats
path: root/package/libs/wolfssl/patches/010-CVE-2021-3336.patch
Commit message (Collapse)AuthorAgeFilesLines
* wolfssl: bump to v4.7.0-stableEneas U de Queiroz2021-02-231-53/+0
| | | | | | | | | | | | | | Biggest fix for this version is CVE-2021-3336, which has already been applied here. There are a couple of low severity security bug fixes as well. Three patches are no longer needed, and were removed; the one remaining was refreshed. This tool shows no ABI changes: https://abi-laboratory.pro/index.php?view=objects_report&l=wolfssl&v1=4.6.0&v2=4.7.0 Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
* wolfssl: Backport fix for CVE-2021-3336Hauke Mehrtens2021-02-091-0/+53
This should fix CVE-2021-3336: DoTls13CertificateVerify in tls13.c in wolfSSL through 4.6.0 does not cease processing for certain anomalous peer behavior (sending an ED22519, ED448, ECC, or RSA signature without the corresponding certificate). The patch is backported from the upstream wolfssl development branch. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>